Security issues in distributed data storage & its solutions

Privacy is mandatory to prevent unapproved clients from contact with the sensitive data as it is subject to illicit disclose and access once it outsourced. Genuineness can keep outsourced data from being returned and altered. The Distributed reckoning is the latest innovation which gives distinctive...

Full description

Saved in:
Bibliographic Details
Published inICCPEIC : 2017 International Conference on Computation of Power, Energy Information and Commuincation : 22-23 March 2017 pp. 149 - 152
Main Authors Punitha, A. Amali Angel, Indumathi, G.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.03.2017
Subjects
Online AccessGet full text
DOI10.1109/ICCPEIC.2017.8290356

Cover

Abstract Privacy is mandatory to prevent unapproved clients from contact with the sensitive data as it is subject to illicit disclose and access once it outsourced. Genuineness can keep outsourced data from being returned and altered. The Distributed reckoning is the latest innovation which gives distinctive robust free administrations through the web. The virtual cloud server permits the client to store their information on the cloud without stressing over accuracy & integrity of the data. The distributed data storage has numerous benefits over local data storage. The user can upload data to the cloud and get those data at anytime and anywhere with no extra burden. The User doesn't need to stress over storage and maintenance of cloud data. In any case, as the data are put in the remote place how users will get the affirmation about stored information. Subsequently, distributed storage ought to have some system which will determine storage correctness and trustworthiness of data stored on a cloud. The main issue of distributed storage is security. Numerous scientists have proposed their work or new encryption algorithms to accomplish security or to resolve this security issue. The proposed encryption scheme leverages to build a secure data storage to significantly improve the security.
AbstractList Privacy is mandatory to prevent unapproved clients from contact with the sensitive data as it is subject to illicit disclose and access once it outsourced. Genuineness can keep outsourced data from being returned and altered. The Distributed reckoning is the latest innovation which gives distinctive robust free administrations through the web. The virtual cloud server permits the client to store their information on the cloud without stressing over accuracy & integrity of the data. The distributed data storage has numerous benefits over local data storage. The user can upload data to the cloud and get those data at anytime and anywhere with no extra burden. The User doesn't need to stress over storage and maintenance of cloud data. In any case, as the data are put in the remote place how users will get the affirmation about stored information. Subsequently, distributed storage ought to have some system which will determine storage correctness and trustworthiness of data stored on a cloud. The main issue of distributed storage is security. Numerous scientists have proposed their work or new encryption algorithms to accomplish security or to resolve this security issue. The proposed encryption scheme leverages to build a secure data storage to significantly improve the security.
Author Punitha, A. Amali Angel
Indumathi, G.
Author_xml – sequence: 1
  givenname: A. Amali Angel
  surname: Punitha
  fullname: Punitha, A. Amali Angel
  organization: Dept of CSE, ULTRA College of Engg & Tech for Women, Madurai, India
– sequence: 2
  givenname: G.
  surname: Indumathi
  fullname: Indumathi, G.
  organization: Dept of ECE, Mepco Schlenk Engg College, Sivakasi, India
BookMark eNotz0FLwzAYgOEICursL9BDTt5avyRNk-BJyqaFgYPpeaTNF4nMVvqlh_17D-703h54b9nlOI3I2IOASghwT13b7tZdW0kQprLSgdLNBSucsUKDg1rJ2l6zgugbAIRrbO30DXve47DMKZ94IlqQeBp5SJTn1C8ZAw8-e055mv0X8keeMnGajktO00h37Cr6I2Fx7op9btYf7Vu5fX_t2pdtmYTRudSiiShCozE21gjvnFbS9sYHqaLXgxlqI10U2npbSwlG-eBtj6CViTgotWL3_25CxMPvnH78fDqcF9Ufj9JJCw
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCPEIC.2017.8290356
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781509043248
1509043241
EndPage 152
ExternalDocumentID 8290356
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-516fe1d65ef6871a995328b7ad23fa5c7c4729f158a8422073ada8be0537fec33
IEDL.DBID RIE
IngestDate Wed Aug 27 02:51:40 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-516fe1d65ef6871a995328b7ad23fa5c7c4729f158a8422073ada8be0537fec33
PageCount 4
ParticipantIDs ieee_primary_8290356
PublicationCentury 2000
PublicationDate 2017-March
PublicationDateYYYYMMDD 2017-03-01
PublicationDate_xml – month: 03
  year: 2017
  text: 2017-March
PublicationDecade 2010
PublicationTitle ICCPEIC : 2017 International Conference on Computation of Power, Energy Information and Commuincation : 22-23 March 2017
PublicationTitleAbbrev ICCPEIC
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001968495
Score 1.6294615
Snippet Privacy is mandatory to prevent unapproved clients from contact with the sensitive data as it is subject to illicit disclose and access once it outsourced....
SourceID ieee
SourceType Publisher
StartPage 149
SubjectTerms Atomicity
Cloud Application programming interface (API)
Cloud computing
Consistency
Distributed databases
Encoding
Encryption
Isolation and Durability (ACID)
Memory
Secure Hash Algorithm(SHA-1)
Service level agreement (SLA)
Title Security issues in distributed data storage & its solutions
URI https://ieeexplore.ieee.org/document/8290356
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH9sO-nFj038JgfxZLs1bdIEj8WxCZOBDnYbafICQ-jEdRf_epO2bioevIWQkvLS9r0mvw-AG1fhM8ZzGVA3Ikg0ykBxjQG1kcwlDvK0AmNOnvholjzO2bwFd1suDCJW4DMMfbM6yzcrvfFbZX1_6Bcz3oZ2KnjN1drtp0guXLHfsOOigeyPs2z6MM48fCsNm0t_eKhUKWR4AJOvyWvkyGu4KfNQf_zSZfzv3R1Cb0fWI9NtGjqCFhbHsP9NZ7AL98-NSx2pwrwmy4IYr5jrza7QEA8TJR4m6T4u5JYsyzXZPpI9mA0fXrJR0LgmBEtXCpQBi7jFyHCGlru_ISUli6nIU2VobBXTqU5cQW0jJpRIKHWvuDJK5N4iIrWo4_gEOsWqwFMgxqvzcW2l8C7pBj2JlVmrYptGdkDlGXR9GBZvtTDGoonA-d_dF7Dnl6IGcF1Cp3zf4JXL6GV-XS3lJwnGoHw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BPKgXP8D4bQ_Gkxvso90ajwsEFAiJkHAjXfuaEJNhZFz86223CWo8eGuaLl1et7239vcBcGcqfEpZyh3fjHBCidwRTKLja4-nHNtpVIAxhyPWm4ZPMzqrwcOGC4OIBfgMXdsszvLVUq7tVlnLHvoFlO3ALg3DkJZsre2OCmexKfcrfpzX5q1-kow7_cQCuCK3uviHi0qRRLqHMPyavsSOvLrrPHXlxy9lxv_e3xE0t3Q9Mt4komOoYXYCB9-UBhvw-FL51JEi0CuyyIiymrnW7goVsUBRYoGS5vNC7skiX5HNQ9mEabczSXpO5ZvgLEwxkDvUYxo9xShqZv6HBOc08OM0EsoPtKAykqEpqbVHYxGHvm9ecqFEnFqTiEijDIJTqGfLDM-AKKvPx6TmsfVJV2hprFRrEejI022fn0PDhmH-VkpjzKsIXPzdfQt7vclwMB_0R8-XsG-XpYRzXUE9f1_jtcnveXpTLOsno6CjyQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=ICCPEIC+%3A+2017+International+Conference+on+Computation+of+Power%2C+Energy+Information+and+Commuincation+%3A+22-23+March+2017&rft.atitle=Security+issues+in+distributed+data+storage+%26+its+solutions&rft.au=Punitha%2C+A.+Amali+Angel&rft.au=Indumathi%2C+G.&rft.date=2017-03-01&rft.pub=IEEE&rft.spage=149&rft.epage=152&rft_id=info:doi/10.1109%2FICCPEIC.2017.8290356&rft.externalDocID=8290356